cyber security

123456789101112131415
Across
  1. 3. (of software) designed to detect and destroy computer viruses
  2. 7. an infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host.
  3. 9. a standalone malware computer program that replicates itself in order to spread to other computers
  4. 12. a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.
  5. 14. a secret word or phrase that must be used to gain admission to a place.
  6. 15. the art of tricking or manipulate to get someone to revel their personal information
Down
  1. 1. looking at someone's information over their shoulder, for example looking at someone enter their PIN in a shop or at a cashpoint. A person can prevent this by using their hand to cover the keypad as they type their PIN, or being aware of people around them when typing in PINs.
  2. 2. having or showing a cautious distrust of someone or something.
  3. 4. the process or action of proving or showing something to be true, genuine, or valid.
  4. 5. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. 6. are body measurements and calculations related to human characteristics. Biometric authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
  6. 8. an identification used by a person with access to a computer, network, or online service.
  7. 10. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  8. 11. the action of obtaining something by using persuasion or guile the action of obtaining private or confidential information by impersonation or another method of deception
  9. 13. any malware that misleads users of its true intent.